Archives
2022 AWS Cloud Security Report [Fidelis]
Cloud environments are increasingly complex, while threats continually evolve. This trend makes simplified cybersecurity imperative to meet both operations and compliance requirements. To close...
2022 Security Visibility Report [Cisco]
As more network traffic from remote users and across data centers, locations, and cloud stacks is encrypted, enterprise IT administrators have increasingly limited visibility...
2022 Application Security Report [Cisco]
Business applications are increasingly under attack from advanced threats and malicious actors that are looking to exploit software vulnerabilities. Organizations are trying to counter...
2022 Application Security Report [Beyond Security by HelpSystems]
Business applications are increasingly under attack from advanced threats and malicious actors that are looking to gain access through vulnerable software. Organizations are trying...
Vulnerability Management Report Opportunities
The VULNERABILITY MANAGEMENT REPORT explores the state of vulnerability management and how organizations are protecting themselves against advanced threats (incl. specific concerns and challenges,...
2022 Managed Security Report
Most IT and security professionals agree that while security is critically important for their organization, they’re still facing major challenges to effectively managing it...
2022 Attack Surface Management Maturity Report [Oomnitza]
Cybersecurity leaders continue to calibrate and extend their attack surface management capabilities as their organizations contend with a worsening threat landscape, as well as...
2022 Threat Hunting Report [DomainTools]
As many SOCs are struggling to cope with the rising security threat workload, more organizations continue to adopt threat hunting as an integral part...
2022 Intrusion Protection & Detection Report [ENEA]
Intrusion Detection & Prevention Systems (IDS/IPS) have long provided a critical last line of defense against sophisticated cybersecurity attacks that have penetrated endpoint and...
2022 Threat Hunting Report [Intrusion]
As many SOCs struggle to cope with the rising security threat workload, more organizations continue to adopt threat hunting as an integral part of...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...